Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach NotificationYue QinYue Xiaoet al.2025NDSS 2025
Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented GenerationMaya AndersonGuy Amitet al.2025ICISSP 2025
Polynomial Adaptation of Large-Scale CNNs for Homomorphic Encryption-Based Secure InferenceMoran BaruchNir Druckeret al.2024CSCML 2024
Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted DataNir DruckerShai Gueron2024CSCML 2024
Unified Lookup Tables: Privacy-Preserving Foundation ModelsNikita JanakarajanIrina Espejo Moraleset al.2024NeurIPS 2024
A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj DayamaVinayaka Panditet al.2024CCS 2024
Security Metrics in Pre-Silicon Processor and System DesignNaorin HossainWilliam Santiago Fernandezet al.2024ICMC 2024
Exploring Vulnerabilities in LLMs: A Red Teaming Approach to Evaluate Social BiasYuya Jeremy OngJay Pankaj Galaet al.2024IEEE CISOSE 2024